-
公开(公告)号:US09875183B2
公开(公告)日:2018-01-23
申请号:US14708401
申请日:2015-05-11
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: John Michael Czerkowicz , Arthur J. Beaverton , Steven Bagby , Sowmya Manjanatha
IPC: G06F12/08 , G06F17/30 , G06F12/0864
CPC classification number: G06F12/08 , G06F12/0864 , G06F17/30097 , G06F17/30949 , G06F2212/1056 , G06F2212/152
Abstract: Apparatus and method for placing data based on the content of the data in random access memory such that indexing operations are not required. A strong (e.g., cryptographic) hash is applied to a data element resulting in a signature. A weaker hash function is then applied to the signature to generate a storage location in memory for the data element. The weaker hash function assigns multiple data elements to the same storage location while the signature comprises a unique identifier for locating a particular data element at this location. In one embodiment a plurality of weak hash functions are applied successively to increase storage space utilization. In other embodiments, the assigned storage location can be determined by one or more attributes of the data element and/or the storage technology, e.g, long-lived versus short-lived data and/or different regions of the memory having different performance (e.g., access latency memory lifetime) characteristics.
-
公开(公告)号:US10255340B2
公开(公告)日:2019-04-09
申请号:US15249864
申请日:2016-08-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: James E. King, III , Michael T. Stack , Arthur J. Beaverson , Steven Bagby
Abstract: Method and apparatus for replicating data structures over a network in which each data structure is assigned an owner node among a plurality of networked peer nodes. Preferably that owner can be ascertained through information in the data structure. When an update to the data structure is desired by a non-owner, a request to modify the data structure is sent out on the network and when received by the owner, the owner performs the modification. The owner node can then notify the other nodes regarding the update. The method, implemented through a single-writer, multiple-reader paradigm, insures availability, partition tolerance and eventual consistency; it avoids the high overhead costs and single point of failure drawbacks of the prior art centralized management and locking protocols. Administrators can connect to any peer node in the network to manage, monitor and request modifications to a data structure.
-